f3ef616dc6
Previously, Swift3 used client-facing HTTP headers to pass the S3 access key, signature, and normalized request through the WSGI pipeline. However, tempauth did not validate that Swift3 actually set the headers; as a result, an attacker who has captured either a single valid S3-style temporary URL or a single valid request through the S3 API may impersonate the user that signed the URL or issued the request indefinitely through the Swift API. Now, the S3 authentication information will be taken from a separate namespace in the WSGI environment, completely inaccessible to the client. Specifically, environ['swift3.auth_details'] = { 'access_key': <access key>, 'signature': <signature>, 'string_to_sign': <normalized request>, } Note that tempauth is not expected to be in production use, but may have been used as a template by other authentication middlewares to add their own Swift3 support. Change-Id: Ib90adcc2f059adaf203fba1c95b2154561ea7487 Related-Change: Ia3fbb4938f0daa8845cba4137a01cc43bc1a713c |
||
---|---|---|
.. | ||
crypto | ||
__init__.py | ||
helpers.py | ||
test_account_quotas.py | ||
test_acl.py | ||
test_bulk.py | ||
test_cname_lookup.py | ||
test_container_sync.py | ||
test_copy.py | ||
test_crossdomain.py | ||
test_dlo.py | ||
test_domain_remap.py | ||
test_except.py | ||
test_formpost.py | ||
test_gatekeeper.py | ||
test_healthcheck.py | ||
test_keystoneauth.py | ||
test_list_endpoints.py | ||
test_memcache.py | ||
test_name_check.py | ||
test_proxy_logging.py | ||
test_quotas.py | ||
test_ratelimit.py | ||
test_recon.py | ||
test_slo.py | ||
test_staticweb.py | ||
test_tempauth.py | ||
test_tempurl.py | ||
test_versioned_writes.py | ||
test_xprofile.py |